Monthly Archives: March 2009

Current Event: Telegraph website hacked

The Telegraph, a famous daily newspaper in the UK, was hacked into by a Romanian hacking group last week. The group exposed a weakness in the way the website queried its database for property searches and was able to obtain … Continue reading

Posted in Current Events, Ethics, Privacy | 1 Comment

Subverting SSL with SSLstrip

At the recent Black Hat security conference, independent hacker Moxie Marlinspike gave a speech about his new tool sslstrip and the techniques that it uses to subvert SSL on a network (a write up can be found at http://www.itpro.co.uk/609932/website-danger-as-hacker-breaks-ssl-encryption and … Continue reading

Posted in Current Events | Comments Off on Subverting SSL with SSLstrip

Current Event: Air Force Engineers develop BitTorrent sniffer

Original article: http://arstechnica.com/security/news/2009/02/airforce-engineers-develop-bittorrent-sniffer.ars The Air Force Institute of Technology has a new method for passive BitTorrent tracking. The system attempts to read the header of BitTorrent packets, and compare the hash in the packet to a known set of bad … Continue reading

Posted in Current Events, Ethics, Integrity, Privacy | Comments Off on Current Event: Air Force Engineers develop BitTorrent sniffer

Security Review: iTunes DAAP Authentication

I am, at the moment of writing this, sitting in Cafe Solstice on the Ave. There are probably about a dozen computers in here, and judging from my neighbor’s screen, 4 of them are running iTunes with the “sharing” feature … Continue reading

Posted in Miscellaneous | Comments Off on Security Review: iTunes DAAP Authentication

Security Review – Google Voice

Product Page: http://www.google.com/voice/about Recently, Google has rolled out another product designed to change the way people use existing technologies. This time, it’s called Google Voice, a replacement/advancement of an existing technology called GrandCentral. Google Voice aims to centralize phone calls … Continue reading

Posted in Security Reviews | 1 Comment

Democratized DDoS attacks

Distributed Denial of Service attacks are becoming less the tool of centralized attackers Continue reading

Posted in Current Events | Tagged | Comments Off on Democratized DDoS attacks

Security Review: Cell Phone Projectors

Authors: Heather Underwood & Guy Bordelon As mobile phones continue to become one of the most popular, universal, and comprehensive computing devices, researchers and mobile phone companies are enthralled with adding more features. As described in a recent article by … Continue reading

Posted in Miscellaneous | Comments Off on Security Review: Cell Phone Projectors

Face Recognition System: Clever or Creepy?

Photo programs that could organize, recognize, and cluster people’s photos are neat because it allows the user to search for pictures. The face recognition technology has also been used to identify people. The way the system works is that the … Continue reading

Posted in Current Events, Privacy | Comments Off on Face Recognition System: Clever or Creepy?

Current Event: Google’s new behavioral based ads v.s. Privacy

Recently, Google released a new way for it to perform interest-based advertising to its users. It utilizes its users’ behavior to send them targeted ads. The question that arises is how do they obtain the users’ behavior? Google saves previous … Continue reading

Posted in Miscellaneous | Tagged | Comments Off on Current Event: Google’s new behavioral based ads v.s. Privacy

The BBC Borrows a Botnet

In an effort to make the public aware of the threat of botnets, the BBC comes very close to violating the UK’s Computer Misuse Act.  The BCC technology program Click acquired a botnet of about 22,000 computers and used them … Continue reading

Posted in Current Events, Ethics | Comments Off on The BBC Borrows a Botnet